Sciweavers

1748 search results - page 133 / 350
» Security Models for Heterogeneous Networking
Sort
View
128
Voted
KES
2006
Springer
15 years 3 months ago
Symbiotic Sensor Networks in Complex Underwater Terrains: A Simulation Framework
Abstract. This paper presents a new multi-agent physics-based simulation framework (DISCOVERY), supporting experiments with self-organizing underwater sensor and actuator networks....
Vadim Gerasimov, Gerry Healy, Mikhail Prokopenko, ...
124
Voted
WS
2005
ACM
15 years 9 months ago
Group-based key pre-distribution in wireless sensor networks
Many key pre-distribution techniques have been developed recently to establish pairwise keys for wireless sensor networks. To further improve these schemes, researchers have propo...
Donggang Liu, Peng Ning, Wenliang Du
109
Voted
JDCTA
2010
172views more  JDCTA 2010»
14 years 10 months ago
Characterizing MEGACO Security in the presence Diameter Server
This paper analyzes performance of MEGACO (Media Gateway Control Protocol) based on Diameter which is an Authentication, Authorization,andAccounting (AAA) protocol developed withi...
Pedram Hajipour, Kolsoom Abbasi Shahkooh
142
Voted
FC
2006
Springer
99views Cryptology» more  FC 2006»
15 years 7 months ago
A Protocol for Secure Public Instant Messaging
Although Instant Messaging (IM) services are now relatively long-standing and very popular as an instant way of communication over the Internet, they have received little attention...
Mohammad Mannan, Paul C. van Oorschot
128
Voted
ACSAC
2001
IEEE
15 years 7 months ago
Why Information Security is Hard-An Economic Perspective
According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of cryptographic protocols, approved ...
Ross J. Anderson